CTO Perspectives, Part III: Leveraging Threat Indicator Confidence

This is the third blog in a three-part series (read parts one and two) by our Chief Technology ...
Alternatives to drinking from a Threat Intelligence fire hose

CTO Perspectives, Part II: Alternatives to Drinking from a Threat Intelligence Fire Hose

This is the second blog in a three-part series by our Chief Technology Officer, Allan Thomson. In ...

CTO Perspectives, Part I: Why do Security Professionals need Threat Intelligence

This is the first blog in a three-part series by our Chief Technology Officer, Allan Thomson. In ...
tech-corner

Welcome to 2015: Encryption is Not an Option! An Interview with Ivan Ristic

If last year felt like a wild ride in terms of security, you were not alone. Good news though: by ...
tech-corner

New Vulnerabilities Galore: Bash Bug and Firefox NSS Issues Hit the Web

By Robert Simmons, Cyveillance Security Manager and Sr. Technologist A number of security experts ...
tech-corner

Is TrueCrypt No More?

By Robert Simmons Late Wednesday night (and as has now been reported by Brian Krebs and others), ...
tech-corner

The Heartbleed Bug: Cutting Through the Noise

As a trusted security partner, our phones have been blowing up the past 24 hours with clients ...
tech-corner

Securing User Privacy with HTTPS

"All Sites Should Deploy HTTPS" Internet Security 101 teaches us that sites should use SSL to ...
tech-corner

Google Search Results Significantly Poisoned

Hundreds of Thousands of Links Leading to Malware Found in Google Results Cyveillance has ...